The leader in Mobile IT, MobileIron was purpose-built to secure and
manage mobile apps, content, and devices for global companies.
Available as an on-premise or cloud solution, MobileIron was the
first to deliver key innovations such as multi-OS mobile device
management (MDM), mobile application management (MAM), and BYOD
privacy controls. For more information, please visit
www.mobileiron.com.

Company:

Narus, Inc.

Booth:

2715

Web:

http://narus.com/

Narus, a wholly owned subsidiary of The Boeing Company (NYSE:BA), is
a pioneer in cybersecurity data analytics. The company's patented
advanced analytics help enterprises, carriers and government
customers proactively identify and accelerate the resolution of
cyber threats. Using incisive intelligence culled from visual
interactive and underlying data analytics, Narus nSystem identifies,
predicts and characterizes the most advanced security threats,
giving executives the visibility and context they need to make the
right security decisions, right now, by letting them know what’s
happening, why, and what to do about it. Narus boosts the ROI from
existing IT investments.

Company:

NPCore

Booth:

2413

Web:

http://www.npcore.com

NPCore, founded in 2008 in South Korea, is a premier network
security solution provider, offering information security products
such as ZombieZERO, for various customers in financial institutions,
municipal offices, colleges, and small & mid-size companies.
ZombieZERO is the only defense solution for the new APT (Advanced
Persistent Threat) attack by offering behavior based security
functions.

Introducing Passages by Ntrepid, a secure browser designed to
mitigate malware and attribution concerns faced when conducting
research and online activities. Passages isolates web browsing
within a virtual machine and uses patented identity control
technology to mask users true location and other identifying
information. Learn more at GetPassages.com.

Company:

NXP Semiconductors

Booth:

1341

Ticker Symbol & Exchange:

Nasdaq: NXPI

Web:

www.nxp.com

NXP Semiconductors N.V. (Nasdaq: NXPI) provides High Performance
Mixed Signal (HPMS) and Standard Product solutions that leverage its
leading RF, Analog, Power Management, Interface, Security and
Digital Processing expertise. It is a global semiconductor company
with operations in more than 25 countries.

OT is a world leader in digital security solutions for the mobility
space. OT has always been at the heart of mobility, from the first
smart cards to the latest contactless payment technologies which
equip millions of smartphones. Present in the Payment,
Telecommunications and Identity markets, OT offers end-to-end
solutions in the Smart Transactions, Mobile Financial Services,
Machine-to-Machine, Digital Identity and Transport & Access Control
fields. OT employs over 6 000 employees worldwide, including 600 R&D
people. With more than 50 sales offices across 5 continents and 10
facilities, OT’s international network serves clients in 140
countries.

Okta is an enterprise-grade identity management service, built from
the ground up in the cloud and designed to address the challenges of
a cloud, mobile and interconnected business world. Okta integrates
with existing directories and identity systems, as well as thousands
of on-premises, cloud-based and mobile applications, to enable IT to
securely manage access anywhere, anytime and from any device. More
than 550 enterprises worldwide use Okta to increase security and
employee productivity, as well as lower IT costs and improve
compliance.

The company is based in San Francisco, CA and is backed by venture
capital firms Andreessen Horowitz, Greylock Partners, Khosla
Ventures and Sequoia Capital. For more information, please visit
www.okta.com.

Company:

OpenDNS

Booth:

South Expo 252

Web:

www.opendns.com

OpenDNS delivers enterprise threat protection to reduce the risk and
impact of security breaches. Unlike on-premises appliances that lack
coverage for eroding network perimeters, OpenDNS' cloud-delivered
platform protects all devices, anywhere, any time without
sacrificing performance or manageability. OpenDNS' security
intelligence leverages a unique satellite view of the Internet and
uses big data, analytics and visualization techniques to predict and
block attacks before they happen. The OpenDNS Global Network is the
world's largest Internet security network and secures over 50
million active users daily through 22 globally distributed data
centers.

Company:

Prevalent Networks

Booth:

1038

Web:

http://www.prevalentnetworks.com/

Prevalent Networks is an IT security innovator that develops proven
technologies and services to help organizations reduce and monitor
threats and risks posed by third-party vendors.

Company:

Procera Networks Inc.

Booth:

2321

Ticker Symbol & Exchange:

PKT

Web:

http://www.proceranetworks.com/index.php

Procera Networks Inc. (NASDAQ: PKT) delivers Internet Intelligence
solutions to service providers and network equipment manufacturers
for analytics and enforcement of broadband traffic worldwide.
Procera’s solutions provide actionable intelligence and policy
enforcement to ensure a high quality experience for any Internet and
network connected device. For more information, visit
http://www.proceranetworks.com or follow Procera on Twitter at
@ProceraNetworks. Procera Networks will showcase its next-generation
Deep Packet Inspection engine, NAVL, alongside two of its technology
partners, Napatech and Intel in Booth #2321. Procera's NAVL offers
industry leading, high performance Deep Packet Inspection technology
for integration into third party platforms.

Company:

RSA

Booth:

3021

Web:

www.EMC.com/RSA

RSA, The Security Division of EMC, is the premier provider of
security, risk, and compliance-management solutions for business
acceleration. RSA helps the world's leading organizations succeed by
solving their most complex and sensitive security challenges. These
challenges include managing organizational risk, safeguarding mobile
access and collaboration, proving compliance, and securing virtual
and cloud environments. Combining business-critical controls in
identity assurance, encryption & key management, SIEM, Data Loss
Prevention, and Fraud Protection with industry-leading GRC
capabilities and robust consulting services, RSA brings visibility
and trust to millions of user identities, the transactions that they
perform, and the data that is generated.

Company:

Seccuris Inc.

Booth:

2520

Web:

http://www.seccuris.com

Seccuris has been helping clients with business-driven information
security solutions through professional consulting and managed
services since 1999. We're the alternative because we help you
uncover known and unknown risks that threaten not only your
technology, but also your entire enterprise. Then we work with you
to design exactly what you need; whether it’s Enterprise Security
Architecture, Information Assurance Audits, IT Risk Management and
Compliance, Security Response Services or our OneStone™ Information
Assurance Portal. That way you can make effective risk-based
decisions at every level. Call us at (866) 644-8442 to discuss the
right solution for your needs.

Company:

Security Mentor

Booth:

532

Web:

https://www.securitymentor.com/

Security Mentor®, pioneer of security awareness training that
employees love to take, enables companies in every industry to
reduce risk by creating a more secure workforce. Interactive, highly
engaging lessons teach critical security skills in an
easy-to-understand, fun format. Our Brief, Frequent, Focused™
training model of 10-minute lessons delivered monthly fits
employees’ busy schedules and keeps security top of mind. Training
is served from Security Mentor’s Cloud LMS or provided as
SCORM-compliant modules. Founded in 2008, customers range from
Fortune 500 enterprises to local and state governments, including
the State of Michigan. To learn more, request a demo at
www.securitymentor.com.

Company:

Seculert

Booth:

127

Web:

www.seculert.com

Seculert provides enterprises comprehensive protection from advanced
persistent threats and malware. Its integrated platform technology
analyzes malware communications, traffic logs, and suspicious files
to identify both known and unknown advanced threats. Seculert’s
proven cloud-based technology leverages crowdsourcing and Big Data
analytics to identify and block attacks as they develop. Founded in
2010, Seculert has offices in the U.S., the U.K. and Israel. For
more information, visit www.seculert.com.

Company:

Secure Access Technologies Inc.,

Booth:

2434 South Hall

Web:

www.SecureAccessTechnologies.com

Secure Access Technologies Inc. (SAT) is a Menlo Park, CA based
start-up that provides the strongest data security on the market
today with stepped-up authentication and real-time proximity
monitoring.

The user authenticates only once to any application on any device
when SAT MobileID is in proximity. When the user walks away, the
data locks automatically.

SAT partnered with RSA and MobileIron and has more than 10 patents
issued. Breakthrough security and user experience. For more
information, visit www.secureaccesstechnologies.com.

Company:

Shape Security

Booth:

2001

Web:

shapesecurity.com

Shape Security is a startup in Mountain View, California that has
created a completely new approach to website defense. Its flagship
product, the ShapeShifter, is the world’s first botwall: an advanced
technology that disables the attack capability of malware, botnets,
and scripts. This results in a comprehensive defense against the
most serious website breaches, for which there are no other existing
solutions. Shape is backed by top investors including Kleiner
Perkins, Google Ventures, and Eric Schmidt. It is led by
cybersecurity leaders from the Pentagon, Cisco, Mozilla, Oakley
Networks, Palo Alto Networks, VMware, and Google.

Our customers rely on our global reach, expertise, and
infrastructure to secure their data, process their electronic
equipment in an environmentally responsible manner, protect their
reputations, and eliminate their compliance risks.

In North America, Sims operates 14 sites enabling us to offer
services anywhere you do business.

Software Diversified Services (SDS) now provides all sales, support,
and development for E-Business Server encryption and security
software. SDS's E-Business Server is based on the McAfee product
formerly marketed under the E-Business Server name, which McAfee has
licensed to SDS.

SDS's commitment means this enterprise-scale encryption server will
remain a trusted tool for years to come.

SDS teams the E-Business Server with its other security tools:
VitalSigns for FTP automates secure file transfer; in collaboration
with software from SSH Corporation, it encrypts data in transit.

Since 1982, SDS has provided software to hundreds of customers
worldwide, including Global 500 companies.

Company:

SOLARFLARE

Booth:

2220

Web:

www.solarflare.com

Solarflare is the leading provider of application-intelligent
networking I/O software and hardware that accelerate, monitor and
secure network data. In January, Solarflare launched SolarSecure to
provide a new level of server protection to mission-critical
networks vulnerable to cyber security breaches. Without any need for
additional hardware, Solarflare enables enterprises to implement
security policies to guard servers at the network level. Solarflare
protects hosts by implementing policies from the Norse Live Threat
Intelligence dark list in the Solarflare DDOS filter engine. Visit
Solarflare Booth #2220 to see the Solarflare+Norse demonstration of
"Self-Protecting, Hardened Hosts."

Company:

SolarWinds

Booth:

2507

Ticker Symbol & Exchange:

NYSE: SWI

Web:

www.solarwinds.com

SolarWinds provides powerful and affordable IT management software
to customers worldwide from Fortune 500 enterprises to small
businesses. In all of our market areas, our approach is consistent.
We focus exclusively on IT pros and strive to eliminate the
complexity that they have been forced to accept from traditional
enterprise software vendors. SolarWinds delivers on this commitment
with unexpected simplicity through products that are easy to find,
buy, use and maintain while providing the power to address any IT
management problem on any scale.

Thales e-Security is a leading global provider of data encryption
and cyber security solutions to the financial services, high
technology, manufacturing, government and technology sectors. Thales
is showcasing its high assurance cryptographic solutions for
protecting big data, public key infrastructures (PKIs), cloud and
mobile payments at this year's RSA Conference. As organizations
increasingly rely on cryptography as part of their data protection
strategy and to protect their critical systems, the trustworthiness
of these crypto systems becomes paramount, particularly in light of
recent concerns over back doors, poorly implemented crypto systems
and the increasing burdens arising from privacy mandates. Thales can
help organizations re-assess and re-evaluate their crypto security
and key management infrastructure and deliver solutions that ensure
their integrity and trustworthiness.

Company:

ThreatTrack Security, Inc.

Booth:

1901

Web:

www.threattracksecurity.com

ThreatTrack Security specializes in helping organizations identify
and stop Advanced Persistent Threats (APTs), targeted attacks and
other sophisticated malware that are designed to evade the
traditional cyber-defenses deployed by enterprises, and small and
medium-sized businesses (SMBs) around the world. The company
develops advanced cybersecurity solutions that analyze, detect and
remediate the latest malicious threats, including its ThreatSecure
advanced malware protection platform, ThreatAnalyzer malware
behavioral analysis sandbox, VIPRE business and consumer antivirus
software, and ThreatIQ real-time threat intelligence service.

Company:

Thycotic Software

Booth:

415

Web:

www.thycotic.com

Thycotic Software deploys smart, reliable, IT security solutions
that empower companies to control and monitor privileged account
credentials and identity access for administrators and end-users. A
member of the Inc. 5000, Thycotic is recognized as the fastest
growing, privately held PAM provider in the USA. Secret Server
manages passwords and identity access across a company's entire IT
infrastructure. Thycotic also provides end-user password rest and
self-service AD group management tools. Trusted by over 2,500
organizations worldwide - including members of the Fortune 500,
enterprises, government agencies, technology firms, universities,
non-profits, and managed service providers. To learn more, please
visit www.thycotic.com.

Company:

TIBCO Software, INC

Booth:

1709

Ticker Symbol & Exchange:

TIBX

Web:

www.tibco.com/loglogic

TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure
software for companies to use on-premise or as part of cloud
computing environments. The TIBCO LogLogic® product line provides
organizations with security, compliance and IT optimization through
enterprise-class log management and predictive intelligence for big
data which enables companies to achieve the Two-Second Advantage® –
the ability to capture the right information at the right time and
act on it preemptively for a competitive advantage. Learn more at
www.tibco.com/loglogic.

Company:

TITUS

Booth:

801

Web:

www.titus.com

TITUS solutions enable organizations to classify, protect and
confidently share information, and meet regulatory compliance
requirements by identifying and securing unstructured data. TITUS
Classification Suite includes the leading email, document and file
classification and marking solutions that enhance data loss
prevention by involving end users in identifying sensitive
information. TITUS solutions are trusted by over 2 million users
within more than 600 organizations in 60 countries around the world.
Our customers include Dell, Nokia, Dow Corning, United States Air
Force, NATO, Pratt and Whitney, Canadian Department of National
Defence, Australian Department of Defence, and the U.S. Department
of Veterans Affairs.

Company:

TraceSecurity

Booth:

2314

Web:

www.tracesecurity.com

TraceSecurity, a leading pioneer in cloud-based security solutions,
provides IT GRC management solutions that give decision makers a
holistic view of their security posture, enable effective data
protection and automate compliance. TraceSecurity's flagship
software solution, TraceCSO, is the first platform to effectively
transform IT GRC management into a unified and easy-to-use business
application and can be deployed in a matter of weeks. With more than
1,700 customers, TraceSecurity supports organizations in financial
services, healthcare, high-tech, insurance, government, education
and other regulated sectors. Founded in 2004, the company has
executive offices in Silicon Valley and offices in Baton Rouge,
Louisiana.

Company:

Trend Micro

Booth:

2601

Ticker Symbol & Exchange:

TSE: 4704; TYO 4704

Web:

www.trendmicro.com

Trend Micro Incorporated a global leader in security software, rated
number one in server security (IDC, 2013), strives to make the world
safe for exchanging digital information. Built on 25 years of
experience, our solutions for consumers, businesses and governments
provide layered data security to protect information on mobile
devices, endpoints, gateways, servers and the cloud. Trend Micro
enables the smart protection of information, with innovative
security technology that is simple to deploy and manage, and fits an
evolving ecosystem. All of our solutions are powered by cloud-based
global threat intelligence, the Trend MicroT Smart Protection
NetworkT infrastructure, and are supported by over 1,200 threat
experts around the globe. For more information, visit TrendMicro.com.

Company:

Trustwave

Booth:

3527, North Hall

Web:

www.trustwave.com

Trustwave helps businesses fight cybercrime, protect data and reduce
security risks. With cloud and managed security services, integrated
technologies and a team of security experts, ethical hackers and
researchers, Trustwave enables businesses to transform the way they
manage their information security and compliance programs while
safely embracing business imperatives including big data, BYOD and
social media. More than two million businesses are enrolled in the
Trustwave TrustKeeper® cloud platform, through which Trustwave
delivers automated, efficient and cost-effective data protection,
risk management and threat intelligence. Trustwave is a privately
held company, headquartered in Chicago, with customers in 96
countries. For more information about Trustwave, visit
www.trustwave.com

Company:

Tufin Technologies

Booth:

1821

Web:

www.tufin.com

Tufin® is the leader in Security Policy Orchestration, automating
and accelerating network infrastructure changes while maintaining
security and compliance. By improving network change processes,
organizations using the Tufin Orchestration SuiteT will have a
positive impact on the business by reducing the time and cost spent
implementing network changes by up to 80 percent. The Tufin
Orchestration Suite helps organizations automate security and
efficiency into day-to-day operations, enabling them to be more
agile and leverage technology to gain a competitive advantage.
Founded in 2005, Tufin serves more than 1,300 customers in
industries from telecom and financial services to energy,
transportation and pharmaceuticals and partners with leading vendors
including Check Point, Cisco, Juniper Networks, Palo Alto Networks,
Fortinet, F5, Stonesoft, Blue Coat, McAfee and BMC Software.

Company:

Unisys Corporation

Booth:

3621

Ticker Symbol & Exchange:

NYSE: UIS

Web:

http://www.unisys.com/unisys/

Unisys is a worldwide information technology company. We provide a
portfolio of IT services, software, and technology that solves
critical problems for clients. We specialize in helping clients
secure their operations, increase the efficiency and utilization of
their data centers, enhance support to their end users and
constituents, and modernize their enterprise applications. To
provide these services and solutions, we bring together offerings
and capabilities in outsourcing services, systems integration and
consulting services, infrastructure services, maintenance services,
and high-end server technology. With approximately 23,000 employees,
Unisys serves commercial organizations and government agencies
throughout the world. For more information, visit
http://www.unisys.com/unisys/.

Company:

University of Denver

Booth:

2133

Web:

http://universitycollege.du.edu

University College, the college of professional and continuing
studies at the University of Denver, offers cutting-edge master's
degrees and certificates online and on campus in Information Systems
Security. Students receive applied instruction from expert
practitioners as they learn to navigate real-world security
challenges. You will analyze security needs, provide viable
solutions, and develop the breadth of knowledge needed for success
in the global arena of information assurance. The curriculum covers
such topics as network security, physical security, cryptography,
cyber law, computer forensics, and application security. The
University of Denver is a designated Center for Academic Excellence
in Information Assurance Education.

Company:

Viewfinity

Booth:

841

Web:

www.viewfinity.com

Viewfinity is leveraging its core endpoint protection technology to
meet the increased need for smarter, more agile security solutions,
that not only detect but respond to threats. Our endpoint agent
diligently monitors for and detects suspicious behavior, and
responds by harnessing attacks before they permeate an IT
infrastructure. Our visibility, detection and remediation, along
with purposeful forensics, provide a structure that helps progress
the level of cybersecurity that targets and adapts enterprise IT
security mechanisms. Our endpoint protection encompasses forensics,
prevention, visibility, and remediation, offering advanced
protection against advanced targeted attacks.

Company:

wolfSSL Inc.

Booth:

839

Web:

http://www.wolfssl.com

wolfSSL, founded in 2004, is an open source Internet security
company whose primary products include the CyaSSL lightweight SSL
library and the yaSSL Embedded Web Server. Primary users are
programmers building security functionality into their applications
and devices. wolfSSL employs the dual licensing model, like MySQL,
offering products under the GPLv2 as well as a standard commercial
license.

wolfSSL's products are designed to offer optimal performance, rapid
integration, the ability to leverage hardware crypto, and support
for the most current standards. All products are designed with clean
APIs, and are backed by a dedicated and responsive support and
development team.

Company:

Wontok, Inc.

Booth:

2502

Web:

www.wontok.com

With global operations, Wontok, Inc. (booth # 2502) delivers proven
data security solutions that fill the gaps left by conventional
security offerings. Wontok's added layer of security provides
businesses, government organizations and consumers the confidence
that their online commerce and communications are secure and their
data is safe. During The RSA Conference February 24-28th, Wontok
announces two new malware prevention products targeted for Retailers
and Banks adding on its flagship product, Wontok™ SafeCentral, a
proven endpoint cybersecurity solution that renders malware
inoperable even on already infected PCs running Windows. Please
contact us to arrange an interview with Wontok's CEO, Adam Tegg.

Company:

Zscaler

Booth:

1135

Web:

www.zscaler.com

Zscaler is transforming enterprise networking and security with the
world’s largest Direct-to-Cloud Network, which securely enables the
productivity benefits of cloud, mobile and social technologies
without the cost and complexity of traditional on-premise appliances
and software.

"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals...

Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York
The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York.
Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...

The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...

Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office.
In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...

Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...

In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.

The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location.
In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...

Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value.
In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.

In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential.
Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...

SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York.
The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY.
"The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...

Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...

"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...

Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation.
In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...

As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...

Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities.
Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.

You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time.
In his session at 19th Cloud Expo, Mark Allen, General Manager of...

The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location.
With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...

Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...

As we enter the final week before the 19th International Cloud Expo | @ThingsExpo in Santa Clara, CA, it's time for me to reflect on six big topics that will be important during the show. Hybrid Cloud: This general-purpose term seems to provide a comfort zone for many enterprise IT managers. It sounds reassuring to be able to work with one of the major public-cloud providers like AWS or Microsoft Azure while still maintaining an on-site presence.

When was the last time you’ve ever heard anyone say “IT Applications & Operations”? Frankly, in my 30+ year career in IT, I don’t believe I’ve ever heard anyone use this term. The typical term we hear is IT Infrastructure & Operations. These two go together like Peanut Butter and Jelly, which tells us a lot about how we view the field of IT. For those that may not be familiar with the role of IT Operations, Joe Hertvik does a great job here of describing IT Operations Management as someone enga...

Multiple agencies across the U.S. government are paying closer attention to the software they are buying. More specifically, they want to know what open source and third party components were used to build the software applications. The report notes:
U.S. Food and Drug Administration (FDA) wants to know what open source components are being used in medical devices.

I’m a huge fan of open source DevOps tools. I’m also a huge fan of scaling open source tools for the enterprise. But having talked with my fair share of companies over the years, one important thing I’ve learned is that you can’t scale your release process using open source tools alone. They simply require too much scripting and maintenance when used that way. Scripting may be fine for smaller organizations, but it’s not ok in an enterprise environment that includes many independent teams and to...

In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential.
Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...

For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That’s one of the reasons executives often discover security breaches when an external researcher — or worse, a journalist — gets in touch to ask why hundreds of millions of logins for their company’s services are freely available on hacker forums.
The huge volume of incoming connections, the heterogeneity of services, and the desire to avoid false positives leave enterpri...

Monitoring of Docker environments is challenging. Why? Because each container typically runs a single process, has its own environment, utilizes virtual networks, or has various methods of managing storage. Traditional monitoring solutions take metrics from each server and applications they run. These servers and applications running on them are typically very static, with very long uptimes. Docker deployments are different: a set of containers may run many applications, all sharing the resource...

Logs are continuous digital records of events generated by all components of your software stack – and they’re everywhere – your networks, servers, applications, containers and cloud infrastructure just to name a few. The data logs provide are like an X-ray for your IT infrastructure. Without logs, this lack of visibility creates operational challenges for managing modern applications that drive today’s digital businesses.

@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.

The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location.
With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...

Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2017' as Conference Chair
The @DevOpsSummit at Cloud Expo will take place on June 6-8, 2017, at the Javits Center in New York City, NY.
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great t...

This is a guest post from Cloudinary, a cloud-based image and video management solution. We are always looking for ways to help companies deliver digital experiences that will meet customers expectations in terms of content and performance. Tackling these 5 challenges is a good step towards delivering a top-notch digital experience.
We are in the midst of a great evolution when it comes to website design. Formerly text-heavy sites now rely on eye-catching images and video to draw in visitors,...

There’s a funny thing about digital transformation: we are simultaneously over-hyping it and understating it. On the one hand, every tech company in the world is talking about it. It doesn’t matter how mundane the technology; every company is somehow relating their products to digital transformation.
On the other, many people are failing to grasp the import and impact of what digital transformation really means. In far too many cases, business and IT leaders are dismissing it as nothing more ...

The holiday shopping season, a time when Americans flock to the malls or online to find those must-have gifts, is about to kick off. Kids are pouring over catalogs and compiling their wish lists, adults are looking at the Black Friday ads to find the best bargain, and retailers are hoping they don’t make the news for failure to meet customers’ expectations. Every year, retailers go into Black Friday thinking they have done everything they can and are prepared for the onslaught of visitors, but s...

Today’s IT environments are increasingly heterogeneous, with Linux, Java, Oracle and MySQL considered nearly as common as traditional Windows environments. In many cases, these platforms have been integrated into an organization’s Windows-based IT department by way of an acquisition of a company that leverages one of those platforms. In other cases, the applications may have been part of the IT department for years, but managed by a separate department or singular administrator.
Still, whether...

SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...

Hewlett Packard Enterprise advanced across several fronts at HPE Discover 2016 in London, making inroads into hybrid IT, Internet of Things, and on to the latest advances in memory-based computer architecture.
A leaner, more streamlined Hewlett Packard Enterprise (HPE) advanced across several fronts at HPE Discover 2016 in London, making inroads into hybrid IT, Internet of Things (IoT), and on to the latest advances in memory-based computer architecture. All the innovations are designed to hel...

@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...

I was walking down the street in Toronto one morning juggling a large tray of Tim Horton's coffee. Standing at a busy corner, waiting for the walk signal, I overheard the following conversation:
Woman: "I can't believe they delivered the new application with all those options. No one said they'd be live."
Man: "I know. I made the changes last week, and for some reason, they went into QA but weren't tested. So I assumed that we weren't rolling them out."

If you haven’t heard yet, CollabNet just put out some very big news for managing and gaining value from DevOps.
We introduced CollabNet DevOps Lifecycle Manager (DLM) — a platform designed exclusively for providing a single pane of glass, dashboard, and traceability views across your DevOps toolchain and processes from planning to operations and that can be traced back to planning and development.

We have been seeing a sudden rise in the deployment of Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL). It looks like the long “AI winter” is finally over. It is interesting to note that AI was mentioned by Alan Turing in a paper he wrote back in 1950 to suggest that there is possibility to build machines with true intelligence. Then in 1956, John McCarthy organized a conference at Dartmounth and coined the phrase Artificial Intelligence. Much of the next three decade...

How can a dinosaur adapt to the modern world? Well, if your ‘dinosaur’ happens to be a mainframe environment, then we suggest you take a good long at DevOps. The next generation of application delivery and agile methodologies are illuminating the challenges and solutions mainframe engineers face on a daily basis. As Continuous Delivery and DevOps evolve, so too should your mainframe and its processes.

Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...

Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his session at @DevOpsSummit 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, showed how customers are able to achieve a level of transparency that enables everyone fro...

The volume of transactions running through websites and mobile apps make customer-facing applications crucial to online businesses. If these applications perform well for their users, they generate revenue for the business. If they don't, they affect the credibility of the business, which in turn affects the overall revenue. It is therefore imperative that businesses understand how well their revenue-critical applications are behaving for their end users.
From an IT team's point of view, unde...

There are many companies offering network monitoring solutions to small, medium and big companies. The question is: is installing a monitoring software in our IT infrastructure really economically viable? Here we will touch some key points, which are directly affected by network monitoring software.

Businesses have always had to transform to find better and more efficient ways to deliver value faster to their users, customers or consumers. The motivating factors are shorter lead times, automated and streamlined value flow, as well as reduction of overall costs and bound capital, requiring enterprises to transition to a continuous innovation and optimization model. Prominent examples […]

Jumping on the Agile bandwagon might help, but only if done right. What makes a good Agile project and what makes a bad one?
The move to Agile in the last decade has resulted in projects that finish faster, produce better software, and come in under budget. Look up any new, hot tech company and you'll find articles lauding their Agile philosophy. You might think that success is guaranteed if you get your team to commit the Agile Manifesto to memory.
The problem with looking at this in a single...

Home-maintenance repair and services provider ServiceMaster develops applications with a security-minded focus as a DevOps benefit.
To learn how security technology leads to posture maturity and DevOps business benefits, we're joined by Jennifer Cole, Chief Information Security Officer and Vice President of IT, Information Security, and Governance for ServiceMaster in Memphis, Tennessee, and Ashish Kuthiala, Senior Director of Marketing and Strategy at Hewlett Packard Enterprise DevOps. The dis...

What is inner source? I spoke about it during my webinar on Tuesday, Nov. 8, but here's a review.
At its most fundamental level, inner source is about replicating successful work practices of the open-source world to commercial software projects.
There are numerous examples of open source software making big splashes in the commercial space - Linux, Firefox, Apache - and inner source takes many of the lessons learned from these massively successful projects and shows you how you can apply some...

Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, and success stories.